Best practices for securing privileged access recommend auditing everything. An audit trail of all actions attributed to a specific user feeds SIEM tools to stop in-progress attacks and aids forensic analysis into abuse of privilege. Because privileged sessions leveraging stolen credentials are a primary attack vector, they can be monitored and terminated in real-time. Video recordings of sessions on critical infrastructure are available for review or use as evidence in the case of a security breach. Centrify Audit and Monitoring Service combines host-based with gateway-based capabilities for maximum coverage. For even greater protection and visibility, take advantage of host-based advanced monitoring at the process level.
Advanced Host-Based Session Recording, Auditing, and Reporting
Make it impossible to bypass session recording with host-based auditing. Discover rogue activity such as creating and storing SSH key pairs that make it easy to circumvent security controls and attribute activity to the individual user. Audit all SSH session activity at the shell and process level in forensic detail for security review, corrective action, and compliance reporting.
Gateway Session Recording, Monitoring & Control
Gain new levels of oversight for remote sessions to critical infrastructure. Security teams watch privileged sessions in real-time and can instantly terminate suspicious sessions through the Centrify Platform. Gateway-based auditing captures sessions where host-based auditing is not possible for a complete view of privileged access and activity.
There isn’t a regulation that Centrify hasn’t helped us to meet. Today, every time an administrator touches a server, I have a record of it. I can pull a report, print it, and hand it to the auditor., IT Specialist and UNIX Systems Architect, State of Michigan Department of Technology, Management and Budget
Learn More About Centrify Server Suite
Centrify Server Suite
Minimize Your Attack Surface and Control Privileged Access to Your On-Premises and Cloud-Hosted...
A Leader in The Forrester Wave: Privileged Identity Management (PIM), Q4 2020
The Forrester Wave™: Privileged Identity Management, Q4 2020 includes 10 providers based on a 24...